A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker tries to change the code in an executable file, a checksum can be used to detect the tampering. While it is easy to compute a checksum for any static file, it is possible for an attacker to tamper with an executable file as it is being loaded into memory, or after it has been loaded. Therefore, it would be more useful to checksum an executable file dynamically only after the file has been loaded into memory. However, checksumming dynamic code is much more challenging than dealing with static code – the code can be loaded into different locations in memory, and parts of the code will change depending on where the code resides in memory (addres...
Signature-based detection relies on patterns present in viruses and provides a relatively simple and...
The main objective of the project was to obtain advanced mathematical methods to guarantee the verif...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker ...
Metamorphic computer viruses change their structure—and thereby their signature—each time they infec...
Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud)...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
Data leakage from kernel memory occurs when the memory block is not released back to the kernel afte...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2001Includes bibliograp...
Currently, passwords are the default method used to authenticate users. As hardware continues to adv...
In this thesis, a natural probabilistic model has been used to test the quality of motif discovery p...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Signature-based detection relies on patterns present in viruses and provides a relatively simple and...
The main objective of the project was to obtain advanced mathematical methods to guarantee the verif...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker ...
Metamorphic computer viruses change their structure—and thereby their signature—each time they infec...
Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud)...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
Data leakage from kernel memory occurs when the memory block is not released back to the kernel afte...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2001Includes bibliograp...
Currently, passwords are the default method used to authenticate users. As hardware continues to adv...
In this thesis, a natural probabilistic model has been used to test the quality of motif discovery p...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Signature-based detection relies on patterns present in viruses and provides a relatively simple and...
The main objective of the project was to obtain advanced mathematical methods to guarantee the verif...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...